risk logo

Research and Information Security Kit for research projects.

RISK promotes a security-first research culture by providing tools, resources, and best practices for maintaining data integrity and privacy.

Join our initial public trial

As member of the INKE Partnership, RISK is supported in part by funding from the Social Sciences and Humanities Research Council.

sshrc logo
Session: Research Security Review
ember mode
You
“Here are two policy versions—what changed, and what risk did we introduce?”
RISK!
I’ll produce: (1) Overview Comparison, (2) control impact, (3) risk severity, (4) recommended wording to close gaps. [[1]]
Outputdiff → findings → policy-ready patch
PoliciesOutdoor • Clean Desk • Lab
What you will get
  • • A detailed overview you can execute
  • • Policy language with enforceable controls
  • • A clear risk narrative for stakeholders
Excuted withknowledge retrieval + document tools

Risk Capabilities

Risk is capable of the following, executing each effectively to support your team.

RAG-grounded security answers

RISK pulls relevant knowledge-base context before answering—so guidance stays aligned to security and your internal standards, not generic web advice.

Research security policies & SOPs

Draft policies like Clean Desk, data handling, access control, retention, incident handling, onboarding/offboarding then iterate fast.

Upload → assess → improve

Upload protocols, SOPs, vendor docs, policies, or reports. Get structured findings: gaps, contradictions, risk hotspots, and recommendations.

Comparison mode that explains impact

Compare versions and get what changed, why it matters, what control shifted, and what to do next—without spending hours diffing docs.

Actionable artifacts

Generate documents you can keep, refine, and reuse. Request improvements that increase clarity, compliance, and operational usability.

Operational add-ons

Generate quizzes for training & awareness; and support listing + generating filled PDF forms when needed.

Research workflows

RISK is built for research realities: fast iteration, ambiguous requirements, and high consequence decisions.

Run a security review
01
Project security posture review

Turn research complexity into a defendable control picture: data types, flows, access, storage, retention, auditability.

02
Policy hardening

Identify missing controls (clean desk, removable media, encryption, logging, access reviews) and produce policy-ready language.

03
Threat modeling support

Map assets, trust boundaries, attack surfaces, and pragmatic mitigations—then document decisions and residual risk.

04
Vendor security sanity checks

Highlight evidence gaps, contradictions, and questions to ask—especially where marketing claims outpace controls.

Upload inputs

SOPs, protocols, policies, vendor docs. Then ask for a gap analysis, control mapping, or rewrite.

Compare versions

Get meaningful changes + security impact—scope, exceptions, enforcement, and residual risk.

Generate policy-ready text

Produce enforceable language and operational checklists teams can actually follow.

How it works

A tight loop designed around your security: retrieving policies, create/update documents, generate security forms.

Ground answers via retrieval

Ask a question; RISK retrieves relevant policies context and answers according to the context of your team.

Create & refine documents

Generate dedicated content, update it on request, and request improvement suggestions.

Update policies

Specify a policy and describe the changes; RISK updates the policy content.

Generate training

Provide intended security training like quizes from a topic to reinforce security awareness.

High-signal prompt recipes
Policy
“Draft a Clean Desk policy for a mixed lab + office environment, include exceptions and enforcement.”
Gap analysis
“Analyze this SOP and list missing controls for access, logging, retention, incident handling, and data classification.”
Comparison
“Compare these two documents. Tell me what changed, which control weakened/strengthened, and recommend a patch.”

Make research security decisions with speed—and receipts.

Grounded analysis, policy-ready writing, and structured outputs designed to survive audits and real-world operations.

FAQ

What RISK does, and in practice.

What is RISK?

RISK is a cybersecurity + research-security expert designed to produce usable outputs (policies, reviews, checklists, guidance) with workflows.

Does RISK create research security policies?

Yes. Drafting and iterating on policy/SOP content is a core workflow: create documents, update them, and improve them with structured suggestions.

How does RISK stay aligned with our internal standards?

RISK can retrieve relevant internal content from your knowledge that you share and use it to ground answers before responding.

What can RISK do with uploaded documents?

You can upload policies/SOPs/protocols/reports and request summaries, comparisons, security flaw analysis, missing controls, and remediation recommendations.